Pages

Search This Blog

Thursday, 23 February 2012

What is it? With the gigahertz race largely abandoned, both AMD and Intel are trying to pack more cores onto a die in order to continue to improve processing power and aid with multitasking operations. Miniaturizing chips further will be key to fitting these cores and other components into a limited space. Intel will roll out 32-nanometer processors (down from today's 45nm chips) in 2009.

When is it coming? Intel has been very good about sticking to its road map. A six-core CPU based on the Itanium design should be out imminently, when Intel then shifts focus to a brand-new architecture called Nehalem, to be marketed as Core i7. Core i7 will feature up to eight cores, with eight-core systems available in 2009 or 2010. (And an eight-core AMD project called Montreal is reportedly on tap for 2009.)

After that, the timeline gets fuzzy. Intel reportedly canceled a 32-core project called Keifer, slated for 2010, possibly because of its complexity (the company won't confirm this, though). That many cores requires a new way of dealing with memory; apparently you can't have 32 brains pulling out of one central pool of RAM. But we still expect cores to proliferate when the kinks are ironed out: 16 cores by 2011 or 2012 is plausible (when transistors are predicted to drop again in size to 22nm), with 32 cores by 2013 or 2014 easily within reach. Intel says "hundreds" of cores may come even farther down the line.

What is it? As its name implies, the memristor can "remember" how much current has passed through it. And by alternating the amount of current that passes through it, a memristor can also become a one-element circuit component with unique properties. Most notably, it can save its electronic state even when the current is turned off, making it a great candidate to replace today's flash memory.

Memristors will theoretically be cheaper and far faster than flash memory, and allow far greater memory densities. They could also replace RAM chips as we know them, so that, after you turn off your computer, it will remember exactly what it was doing when you turn it back on, and return to work instantly. This lowering of cost and consolidating of components may lead to affordable, solid-state computers that fit in your pocket and run many times faster than today's PCs.

Someday the memristor could spawn a whole new type of computer, thanks to its ability to remember a range of electrical states rather than the simplistic "on" and "off" states that today's digital processors recognize. By working with a dynamic range of data states in an analog mode, memristor-based computers could be capable of far more complex tasks than just shuttling ones and zeroes around.

When is it coming? Researchers say that no real barrier prevents implementing the memristor in circuitry immediately. But it's up to the business side to push products through to commercial reality. Memristors made to replace flash memory (at a lower cost and lower power consumption) will likely appear first; HP's goal is to offer them by 2012. Beyond that, memristors will likely replace both DRAM and hard disks in the 2014-to-2016 time frame. As for memristor-based analog computers, that step may take 20-plus years.

The creator of the world wide web, Tim Berners-Lee, has made an odd request: for a kind of rating system to help people distinguish sites that can be trusted to tell the truth, and those that can't.

Berners-Lee was speaking at the launch of the World Wide Web Foundation , which aims to ensure that everyone in the world benefits as the web evolves.

In his speech he referred to the way fears that the LHC could destroy the worldspread like wildfire online. As the BBC puts it , he explained that "there needed to be new systems that would give websites a label for trustworthiness once they had been proved reliable sources."

He went on to say that he didn't think "a simple number like an IQ rating" is a good idea: "I'd be interested in different organisations labelling websites in different ways". Whatever process is used to hand out the labels, it sounds like a bad idea to me.

Berners-Lee himself directed us towards some of the its biggest problems:

"On the web the thinking of cults can spread very rapidly and suddenly a cult which was 12 people who had some deep personal issues suddenly find a formula which is very believable...A sort of conspiracy theory of sorts and which you can imagine spreading to thousands of people and being deeply damaging."

There are plenty of arguments online already about whether Scientology is a cult. I find it unlikely anyone will be keen to step in and label sites on either side as not to be trusted. Others might reasonably argue that all religions - whether established or not - should come with a warning message.

As for wading in to put a stop to conspiracy theories, I can't image anything their proponents could benefit from more.

Berners-Lee also mentioned the system would help people find out the real science behind, for example, the LHC's risks. You might think handing out rating for sites about science would be easier, with publishers of peer-reviewed science, for example, receiving a top rating without problems.

But there will be papers in the archives of any journal that have been entirely superseded. And a whole lot more that present results that are valid, but can be misleading to some readers. Web licences to ensure that people only read sites they can handle are the next logical step.

Fortunately it's much more likely that the whole idea will quietly be forgotten, which will at least prevent Berners-Lee receiving one of the first "potentially misleading" badges for thinking it up in the first place.

Protect yourself from hackers by this program, So can not do any one by this program you can penetrate your account facebook2. Hack Facebook :Is able to penetrate anyone who has an account in the facebook Knowing the password + EmailSystem requirements:

Saturday, 18 February 2012

The enormous Playstation console smash hit
Final Fantasy VII makes a successful debut on the personal computer,
converted beautifully by designers Squaresoft and Eidos Interactive.
Gamers familiar with Squaresoft’s popular Final Fantasy series should
have little trouble grasping the seventh title’s action-packed,
role-playing game play. However, Final Fantasy VII’s excellent
documentation and intuitive controls ensure that beginners won’t feel
overwhelmed.

Players assume the role of Cloud Strife, a defector of Shinra, the
evil corporation maintaining control over the planet. As the game opens,
Cloud joins “Avalanche,” a resistance group determined to foil the
corporation’s diabolical plans. Final Fantasy VII features an extremely
complex story line, offering many hours of game play (over 60 minutes of
impressive cinematic sequences are also included).
Final Fantasy VII’s game play involves exploration, puzzle solving,
and real-time combat. Players control Cloud during exploration and take
on additional party members for battle sequences, which include both
fantastic weaponry and dazzling spells. While the graphics are
top-notch–and support 3-D hardware accelerators to sharpen the character
models–the sound effects won’t impress many; Squaresoft made little
effort to utilize a personal computer’s sophisticated sound card to its
potential.
Although deeply rooted in the limitations of the Playstation console
(limited menu system, weak music, no voice-overs), Final Fantasy VII’s
highly addictive, easy-to-learn game play should provide adventure and
role-playing fans many hours of enjoyment. –Doug Radcliffe
Pros:
Epic story line
Well-developed characters
Beautiful graphics and spell effects
Complex magic system
Cons:
Dialogue can get cheesy
Weak sound
Frustrating interface
installation notes
i have provided a copy of powerISO 4.6 with serial in this torrent for
anyone that doesnt have it.. mount the install disc and install like you
would anything else, bear in mind that x64 systems will not able able
to install the yamaha codex, hence, no movies.. how ever i have tested
this on winxp sp3 and win7 x64, the game installs and plays fine on
both.
enjoy this epic, endlessly replayable game for years to come!

tech-comps.in
– IDM is already entering its final version now comes back with the
latest version of Internet Download Manager Build 2 Full Version 6:09.
Not much different from previous versions, here IDM only cover the bugs
in previous versions and integrate the download manager is so much
better when the sandingkan with browser software.

Friday, 17 February 2012

An all-in-one utility to tweak, optimize,
tune and clean up your Windows 7, it includes over thirty different
utilities to help make your system perform faster, increase stability
and security, and helps you to personalize your copy of Windows 7. It
bundles more than 30 different utilities. Tweak your system to improve
windows startup and shutdown speed; tweak your hardware to increase
system speed and performance; Optimize Task Schedule to turn off
unnecessary system tasks. Find out which files or folders engross your
disk space and shown with chart; Find and clean junk files to increase
Hard Disk space; Duplicate Files Finder can scan your computer for files
with the same size, name and modification time.

Information
Get detailed system and all hardware information on your system; help
you find out the installation key of Windows, Office products; show all
detailed information of running processes and threads on your machine;
Windows 7 Manager offers 1-clicking cleans your system automatically.

Thursday, 16 February 2012

Trojan Remover aids in the removal of Malware – Trojan Horses, Worms, Adware, Spyware – when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always good at effectively removing it. The majority of Anti-Malware Scanners are well able to detect malicious software – Trojan Horses, Internet Worms, Adware/Spyware etc. – but are not always efficient in removing them once they have been triggered.

Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Two types are available.

The Standard scan quickly scans the system with no need for further configuration of the scan parameters.The Custom scan… allows the user to select any of the folders for scan.

Are you bombarded with popup ads, seeing new toolbars in your browser, is your home page changing to unwanted destinations or are you bombarded with irritating spam? Perhaps strange software loads on startup or your favorites have new entries that YOU DONT WANT. If So.. Your PC is most likely infected with adware, spyware, spybot, trojans or another internet parasite.

These programs have the ability to track your browsing habits and even steal such personal information as bank account numbers and passwords. Spyware has the power to install more parasites on your computer without your consent. Everything you do and everything you type is being recorded right now! Companies know what your interests are! Hackers will access your PC and do anything they wish. They can even steal your Identity and You would never be the wiser!

The Solution: Download the latest version of Loaris Trojan Remover right now. You will be able to completely clean your computer of all these invasive threats! Your computer will be clean and will run alot faster – Your Privacy will be Protected!

Additional Tools:

• Reset Internet Explorer Home/Start/Search Page Settings

Some Malware programs make changes to the Internet Explorer Home, Start and Search Page settings in order to re-direct the web browser to different websites. This Utility will reset the Home/Start/Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it “blank”, the default).

• Reset HOSTS file

The Windows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often – by equating the website name (e.g.microsoft.com) with its DNS address, the web browser can find the website more quickly as it does not have to query a DNS Name Server. Some Malware programs add entries to this file, to either deny access to websites (usually security-related or antivirus company websites), or to re-direct access to websites of their choosing.

• Reset Windows Update Policies

Some Malware programs attempt to prevent Windows Update from running, and inhibit access to resetting Windows Update by blanking out the Windows Update options on the Update configuration screen. This Utility will check the current Windows Update settings and correct them where necessary.

Tuesday, 14 February 2012

Requirement
* The first requirement of this tutorial is on the PC you already have
installed avira internet security 2012, well for those who do not have
please first download and then install avira internet security 2012.
Activation
1. Download APSSKD
2. APSSKD.zip then extract the comp / laptop.
3. Then click APSSKD (umbrella icon).
4. Next input Reg. Name dan Reg. Name and Reg. Code (We only need 1x Registration only).
5. After APSSKD successful registration, unlimited download key / license Avira.
6. Key Avira will be updated weekly.
7. If you use Key who already expired, you bs download the latest from APSSKD Key.
8. completed.

After successful registration APSSKD, then you can download as much of APSSKD avira key.

So if one day was about to expire Key, you can replace it with Newest Key,